Showing 221 - 237 results of 237 for search '"Data sharing"', query time: 0.09s Refine Results
  1. 221

    The power of personas: Exploring an innovative model for understanding stakeholder perspectives in an oncology learning health network by Dylan J. Cooper, Jessie Karten, Sarah E. Hoffe, Daniel A. King, Matthew Weiss, Danielle K. DePeralta, Andrew L. Coveler, Sunil R. Hingorani, Tracey Shefter, Cheryl Meguid, Hannah Roberts, Theodore S. Hong, Amol Narang, Amy Hacker‐Prietz, George A. Fisher, Jay Sandler, Laurie Singer, Bobby Korah, William Hoos, Carrie T. Stricker, Joseph M. Herman

    Published 2025-01-01
    “…Abstract Introduction Learning health networks (LHNs) improve clinical outcomes by applying core tenets of continuous quality improvements (QI) to reach community‐defined outcomes, data‐sharing, and empowered interdisciplinary teams including patients and caregivers. …”
    Get full text
    Article
  2. 222

    Application of artificial intelligence in the health management of chronic disease: bibliometric analysis by Mingxia Pan, Mingxia Pan, Rong Li, Junfan Wei, Huan Peng, Ziping Hu, Yuanfang Xiong, Na Li, Yuqin Guo, Weisheng Gu, Hanjiao Liu, Hanjiao Liu

    Published 2025-01-01
    “…These include improving research quality, fostering greater international and inter-institutional collaboration, standardizing data-sharing practices, and addressing ethical and legal concerns. …”
    Get full text
    Article
  3. 223
  4. 224

    Development and application of intelligent auxiliary diagnosis system in the Traditional Chinese Medicine nursing clinic (智能辅诊系统在中医护理门诊中的开发与应用)... by ZHANG Jing (张敬), TANG Ling (唐玲)

    Published 2021-01-01
    “…In order to further simplify the treatment process, solve existing problems, increase data sharing, and promote the communication and cooperation between medical staff and patients, our hospital has developed an intelligent auxiliary diagnosis system through the integration of "Internet + technology" and TCM nursing. …”
    Get full text
    Article
  5. 225

    Advances and Prospects in Smart Border Studies Based on a Bibliometric Analysis by Yang Danxuan, Li Cansong, Hu Wei, Lai Zulan, Ge Xurui

    Published 2025-01-01
    “…A smart border management model with Chinese characteristics should be constructed, emphasizing data sharing, technological interoperability, and coordination and cooperation among all parties. …”
    Get full text
    Article
  6. 226
  7. 227
  8. 228
  9. 229

    L’involution géographique : des données géosociales aux algorithmes by Teriitutea Quesnot

    Published 2016-12-01
    “…Geolocated data shared on the social web arouse geographers’ interest. …”
    Get full text
    Article
  10. 230

    Open Source Data and Strategic Project for Resilient City by Cristina Càndito, Manuel Gausa, Matilde Pitanti, Giulia Sola

    Published 2019-06-01
    “…In the research field, an experimental analysis is carried out within the Genoese neighborhood of Molassana by comparing and processing, in a single system, the traditional cartography provided by the online portals of the public administration and the data shared by users on social networks and open source platforms. …”
    Get full text
    Article
  11. 231

    Improve the robustness of algorithm under adversarial environment by moving target defense by Kang HE, Yuefei ZHU, Long LIU, Bin LU, Bin LIU

    Published 2020-08-01
    “…Traditional machine learning models works in peace environment,assuming that training data and test data share the same distribution.However,the hypothesis does not hold in areas like malicious document detection.The enemy attacks the classification algorithm by modifying the test samples so that the well-constructed malicious samples can escape the detection by machine learning models.To improve the security of machine learning algorithms,moving target defense (MTD) based method was proposed to enhance the robustness.Experimental results show that the proposed method could effectively resist the evasion attack to detection algorithm by dynamic transformation in the stages of algorithm model,feature selection and result output.…”
    Get full text
    Article
  12. 232

    AONT-and-NTRU-based rekeying scheme for encrypted deduplication by Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI

    Published 2021-10-01
    “…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
    Get full text
    Article
  13. 233

    Design of federated routing mechanism in cross-domain scenario by Peizhuang CONG, Yuchao ZHANG, Ye TIAN, Wendong WANG, Dan LI

    Published 2020-10-01
    “…With the development of multi-network integration,how to ensure efficient interconnections among multiple independent network domains is becoming a key problem.Traditional interdomain routing protocol fails due to the limitation of domain information privacy,where each autonomous domain doesn’t share any specific intra-domain information.A machine learning-based federated routing mechanism was proposed to overcome the existing shortcomings.Each autonomous domain shares intra-domain information implicitly via neural network models and parameters.It not only breaks data islands problems but also greatly reduces the amount of transmitted data shared between domains,then decreases convergence delay of entire network information.Based on the federated routing mechanism,border routers can formulate global optimal routing strategies according to the status of entire network.…”
    Get full text
    Article
  14. 234

    Interpretative phenomenological analysis of guidance advocates’ online counseling experiences by Amabel Tangco-Siason, Rex S. Paulino

    Published 2025-01-01
    “…Among these variables are: (i) discourse that mirrors the exchanges between a counselor and a client; (ii) framework, which includes OC dynamics and changing communication requirements; and (iii) learner autonomy, which stands for the involvement of clients in online learning.DiscussionA community-based framework for developing students is formed by these variables. The data shared by participants reveal complex issues as they struggle with the limitations and realities of applying standards in multimodal counseling sessions. …”
    Get full text
    Article
  15. 235

    Assessment of relationships between epigenetic age acceleration and multiple sclerosis: a bidirectional mendelian randomization study by Hongwei Liu, Hanqing Zhang, Zhaoxu Yin, Miaomiao Hou

    Published 2025-01-01
    “…Methods This analysis employed statistics approaches from genome-wide association studies related to various epigenetic clocks (GrimAge, HannumAge, PhenoAge, and HorvathAge) and multiple sclerosis, utilizing robust instrumental variables from the Edinburgh DataShare (n = 34,710) and the International Multiple Sclerosis Genetics Consortium (including 24,091 controls and 14,498 cases). …”
    Get full text
    Article
  16. 236

    Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks by Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu, Baodong Qin

    Published 2024-12-01
    “…Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform are usually somewhat limited, which significantly reduces the flexibility of the scheme in quantum network environments. …”
    Get full text
    Article
  17. 237

    Natural Language Processing and Social Determinants of Health in Mental Health Research: AI-Assisted Scoping Review by Dmitry A Scherbakov, Nina C Hubig, Leslie A Lenert, Alexander V Alekseyenko, Jihad S Obeid

    Published 2025-01-01
    “…This review can be a starting point for researchers looking for an overview of mental health projects using text data. Shared datasets could be used to place more emphasis on SDOH in future studies.…”
    Get full text
    Article